General
-
Target
6c54e110dd29f082ce13dcd1e2a4ac2a700cc8b7c1bb51afe84ebad355e3689a
-
Size
1.3MB
-
Sample
221125-yrtx1sef8t
-
MD5
7282dde8f4e69bf9a0052619e9437f75
-
SHA1
ab5318514627783e106c108ae1f530f0b7b9f643
-
SHA256
6c54e110dd29f082ce13dcd1e2a4ac2a700cc8b7c1bb51afe84ebad355e3689a
-
SHA512
971d08fa409d5f5f7f02bd6f7f2eddea0056bf295764b41e1dfcbcb2429c066766719e7fd78fb772e3a71c0cce78b65b399a5b03214d3bb55cda6cb7b68da2fa
-
SSDEEP
24576:Dx7ByxTiTzAsAvRTHCNsPLkNiY2shReIXE9G06EJGmx59igUWekaFaqi652l:97IiYsQRhT6iY2shR7XP0DUmx5YgUTkh
Static task
static1
Behavioral task
behavioral1
Sample
factura 009824.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
factura 009824.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
bandook
bandar123.ddns.net
Targets
-
-
Target
factura 009824.exe
-
Size
1.6MB
-
MD5
752e301ae1f726fd98279c779a31ef2e
-
SHA1
b2dca2b0913cbdc98d652917adcd157c778957c0
-
SHA256
bd318d45e08bceab9470b1cfec2e8a9e70c790daff0770a6bb60682653ac9480
-
SHA512
aaac35a116456d1a06c4e491265fab870ea41b28cdb35d93ba94276b75e1a418754fc9b3f35917ead90ef3959a7c3fab032a69298a8d0c0da6c2d949ad5d9fdd
-
SSDEEP
49152:ploCs/JrR6MYq4jRUiXXFpBdftBYxnbmFVpQhaYG:plOR96MR4VjLQnbUVpiG
Score10/10-
Bandook payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-